Chapter 9 Internet Law Social Media And Piracy Flashcards

1
Q

Undertaking spam, spyware and fraud

Allows FTC to work with foreign agencies investigating and prosecuting

International cooperation
Enforcement beyond borders act

A

uS SAFE WEB ACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Have significant protection to owners of copyrights in digital information

Makes circumvention of encryption software or any anti-piracy software criminal and civil prosecutable

Limits liability of ISP unless they are aware of aubscribera violation

A

Digital millennium copyright ACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Amended federal wiretapping law to cover electric forms communication

Applies to communications via social media

Also prohibits prohibits the use/disclosure of any information obtained by the interception

A

Electronic communications privacy act

ECPA
Excludes communications through devices that an employer provides ( in the ordinary course of business)

Allows employers to avoid liability if employees consent to having electronic communications monitored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Prevents cell phone companies and social media networks from divulging private communications to certain entities or individuals

Criminal and civil sanctions for violation

Compensatory damages and punitive possible

A

Stored communications act

SCA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most common cyber tort

A
Online defamation
( often hard to find perp.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is negative speech on Social media protected speech ?

A

NO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

No provider or user of interactive computer service shall be treated as publisher of info provided by a third party

A

CDA

Communications decency act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Investigates consumer complaints of privacy violations

A

FTC

Federal trade commission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Can employers normally ask for social media passwords

A

Yes excluding four states that passed legislation in 2013

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2003 congress enacted the CAN SPAM act which effectively
Eliminated unsolicited emails

T or F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Because the can spam act only applies to emails originating in the U.S. congress enacted the —

A

U.S. Safe web act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Loss of ——- occurs when someone uses a domain name similar to yours

A

Goodwill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The act of registering a domain name that is the same as or similar to the trademark of another and then offering to sell that domain name back to the trademark owner

A

cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The act of buying names that are similar to well known names exept for slight misspellings

A

Typo squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Using another’s trademark in a meta-tag will normally constitute trademark infringement

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A claim of trademark dilution requires proof that consumers will likely be confused by a connection between the unauthorized use and the Mark

17
Q

The sharing of resources amoung multiple computers without nessisailly requiring a central network server

A

Peer to peer networking

18
Q

A network that can be used by perso. Loaches around the country or globe to share computer files

A

Distributed network

19
Q

The delivery of users of on demand services from third party servers over a network

A

Cloud computing

20
Q

Social media posts that contain trademarked images and copyrighted materials typically infringe the intellectual property rights of others

21
Q

Social media posts can be used to detect and prosecute criminals, further investigation by federal regulators into illegal activities

T or F

22
Q

The business extension the the electronics communications privacy act permits employers to monitor employees personal communications

T or F

23
Q

Which act prevents cell phone companies and social

Media networks from divulging private communications the certain entities and individuals

A

Stored communications act

24
Q

To protect from would be cybersquatting and typo squatters large corps may have to

A

Register 1000’s of domain names accross the globe

25
To test computer security and conduct encryption research one can circumvent the exeptional software and anti-piracy provisions
True
26
Downloading music onto your computers RAM without authorization is
Copyright infringement
27
Registered domain names are protected as
Trademarks
28
What does the top level part of a domain name indicate
The type of entity that operates the sight
29
Applies to commercial and electronic mail messages -false return addresses -misleading or deceptive information Randomly generated e-mail addresses/ harvesting
CAN-SPAM ACT | Controlling the assault of non-solicited porn and marketing